Information Security

Often, one of the main goals of a pen tester is to get Domain Admin (DA) rights in a client’s Windows network. But why do we want to get that level of access? For some, it may just be the satisfaction of navigating far enough to compromise the DA account. But, in reality, gaining DA …

Healthcare organizations are a prime target for many malicious individuals and organizations in the information age. Identity thieves, blackmailers, and even the curious public are attracted to the intense amounts of personal information a healthcare organization must collect to provide adequate levels of care. Understanding the current state of security in healthcare is paramount to …

Security Incident Response is like firefighting: it’s not something you need everyday, but when you need it, you want the best, and you want it fast. We’re proud to announce our new cyber security incident response team, and we’d like to tell you what they do, and how best to utilize this new service. We …

One of my favorite ways to eat Oreo cookies is to twist the two halves apart, carefully set the filling aside, eat both chocolate halves, and then slowly enjoy the indulgent filling. Without milk, this is by far the best way to fully indulge in both parts of the cookie. But with a glass of …

The Metasploit Framework is a key resource for security assessors. Whether you’re goal is to become a commercial penetration tester, to demonstrate the risk of a vulnerability, or just need to identify certain weaknesses in your environment, Metasploit is your tool. Understanding how it works, and how to get started is the first step. The Metasploit project …

Secure Ideas is very excited to announce their training event for April. We have worked with the Core Group and TrustedSec to create an event that covers a wide variety of training needs. The event is April 6-9th 2015 and will be held at the Palms International Resort. We are in the process of getting …

If you are paying attention to the news, security is a big topic. At least that’s what CNN and the Wall Street Journal think. And I would happen to agree. (I may be a bit biased!) But even with things like Heartbleed and 0-day flaws in IE, we still commonly hear from small businesses that …

At Secure Ideas, we work with a large number of organizations. These range from small mom-and-pop businesses to international corporations and government agencies. In any of these examples, we find that CIOs and management make the same mistakes when it comes to dealing with their security issues. When people talk about security and risk, we …

Mobile devices and applications are everywhere. And we have seen tons of information, guides and what not on how to build successful businesses around the next big mobile application. There is even an article spreading around right now about how somebody learned how to program in 3 days and has released an amazing application. But …